CN110869910B - Search resource recommendation method and related products - Google Patents
Search resource recommendation method and related products Download PDFInfo
- Publication number
- CN110869910B CN110869910B CN201780092163.9A CN201780092163A CN110869910B CN 110869910 B CN110869910 B CN 110869910B CN 201780092163 A CN201780092163 A CN 201780092163A CN 110869910 B CN110869910 B CN 110869910B
- Authority
- CN
- China
- Prior art keywords
- downloading
- resource
- amount
- resources
- download
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000001680 brushing effect Effects 0.000 claims abstract description 112
- 238000012545 processing Methods 0.000 claims description 29
- 239000000284 extract Substances 0.000 claims description 13
- 230000002159 abnormal effect Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 230000008901 benefit Effects 0.000 abstract description 2
- 238000004891 communication Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9537—Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/308—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/81—Threshold
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/88—Monitoring involving counting
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Remote Sensing (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Physics (AREA)
- Computer Hardware Design (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A search resource recommending method and related products, the method includes the following steps: receiving a search request sent by a terminal, wherein the search request comprises: search keywords (S201); searching resources corresponding to the keywords according to the keywords (S202), and analyzing the resources to confirm the brushing amount resources and the non-brushing amount resources in the resources (S203); extracting the total downloading amount of the non-brush-amount resources, extracting the adjustment downloading amount of the non-brush-amount resources, determining a recommended strategy of the resources according to the total downloading amount and the adjustment downloading amount, and sending the resources to the terminal according to the recommended strategy (S204). The technical scheme provided by the method has the advantages of accurately searching the hot resources and improving the experience of the user.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a search resource recommending method and related products.
Background
The downloading amount is an important reference information for judging the heat of each application program by the operation center, and the downloading amount is meant to be the number of times that a user downloads an application program, in general, the larger the downloading amount is, the larger the heat is for an application program, so the downloading amount is very important reference information for an application program. In order to improve the downloading amount of the application program, the phenomenon of malicious brushing amount occurs, namely, the downloading amount exceeds the set amount in a time period, how to remove the malicious brushing amount becomes the problem to be solved by each search module, and the existing search module cannot remove the malicious brushing amount, so that a user cannot search for hot resources through the search module, and the experience of the user is affected.
Disclosure of Invention
The embodiment of the invention provides a search resource recommending method and related products, which can realize the elimination of malicious brushing amount, accurately search hot resources and improve the experience of users.
In a first aspect, an embodiment of the present invention provides a search resource recommendation method, where the method includes the following steps: receiving a search request sent by a terminal, wherein the search request comprises: searching keywords; searching resources corresponding to the keywords according to the keywords, and analyzing the resources to confirm the brushing amount resources and the non-brushing amount resources in the resources; extracting the total downloading amount of the non-brush-amount resources, extracting the adjustment downloading amount of the non-brush-amount resources, determining a recommendation strategy of the resources according to the total downloading amount and the adjustment downloading amount, and sending the resources to the terminal according to the recommendation strategy.
In a second aspect, a search resource recommendation apparatus is provided, the apparatus: the receiving and transmitting unit is used for receiving a search request sent by the terminal, and the search request comprises: searching keywords; the processing unit is used for searching the resources corresponding to the keywords according to the keywords, analyzing the resources and confirming the brushing amount resources and the non-brushing amount resources in the resources; extracting the total downloading amount of the non-brush-amount resources, extracting the adjustment downloading amount of the non-brush-amount resources, determining a recommendation strategy of the resources according to the total downloading amount and the adjustment downloading amount, and sending the resources to the terminal according to the recommendation strategy.
In a third aspect, there is provided a smart device comprising one or more processors, a memory, a transceiver, and one or more programs stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps in the method provided in the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method provided in the first aspect.
In a fifth aspect, there is provided a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform the method provided by the first aspect.
The embodiment of the invention has the following beneficial effects:
it can be seen that, according to the embodiment of the invention, after a search request is received, a keyword corresponding to the search request is searched to obtain a resource, then the resource is distinguished to obtain a brushed resource and a non-brushed resource, the strategy of extracting the downloading amount is respectively confirmed according to whether the brushed resource is brushed or not, and then the recommendation strategy is determined according to the downloading amount, so that the recommendation of the non-brushed resource is optimized, the public hot spot is reflected to the greatest extent, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a network architecture.
Fig. 2 is a flow chart of a search resource recommending method according to an embodiment of the present invention.
Fig. 2a is a schematic diagram of a map of a download label according to an embodiment of the present invention.
Fig. 2b is a schematic diagram of a screenshot process provided by an embodiment of the present invention.
Fig. 3 is a flowchart illustrating a method for acquiring search resources according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a search resource recommendation device according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an intelligent device according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of another intelligent device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Optionally, in the searching resource recommending method, the analyzing the resource to confirm the brushed resource and the non-brushed resource in the resource includes:
extracting a first resource in the resources, judging whether the first resource has malicious brushing amount within a set time, if so, determining that the first resource is brushing amount resource, and if not, determining that the first resource is non-brushing amount resource.
Optionally, in the searching resource recommending method, the determining whether the first resource has a malicious brushing amount in a set time includes:
counting a first number of a plurality of downloading requests of the first resource in the set time period, if the first number is larger than a first threshold value, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the plurality of downloading requests at the position of the downloading coordinates of a map in a downloading marking mode, dividing the map into a plurality of rectangles with equal areas, obtaining values of the downloading coordinates in each rectangle, forming a second number value group by the values of the downloading coordinates in each rectangle, counting the number of values larger than a second threshold value in the second number group and the maximum value in the second number value group, and if the number is larger than a third threshold value or the maximum value is larger than a fourth threshold value, determining that the first resource has malicious brushing amount, otherwise, determining that the first resource does not have malicious brushing amount.
Optionally, in the method for recommending search resources, the determining a recommendation policy of the resources according to the total downloading amount and the adjusted downloading amount includes:
and analyzing the brushing resources to determine whether the brushing resources are accurate searches of the keywords, and if so, determining that the recommended strategy of the brushing resources is to ignore the brushing resources.
Optionally, in the search resource recommendation method, the adjustment downloading amount=k (total downloading amount-malicious downloading amount), where k is a set coefficient, and a value of k is greater than zero and less than or equal to 1.
Optionally, in the searching resource recommending method, the determining the recommended policy of the brushing resource is to ignore the brushing resource, including: and shielding the brushing amount resource.
Optionally, in the search resource recommendation method, the recommendation policy is: one or any combination of a download ordering strategy, a click volume comprehensive ordering strategy or a shielding strategy.
Optionally, in the searching resource recommending method, the determining whether the first resource has a malicious brushing amount in a set time includes:
counting a first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold, extracting terminal identifications of the plurality of downloading requests, counting a third number value group of the downloading number value of each terminal identification, acquiring a second number of values larger than a fifth threshold from the third number value group, if the second number is larger than a sixth threshold, determining that the first resource is a brushing amount resource, if the second number is smaller than the sixth threshold, and determining that the first resource is a non-brushing amount resource.
Optionally, in the searching resource recommending method, the determining whether the first resource has a malicious brushing amount in a set time includes:
counting the first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold value, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the downloading requests on a map in a downloading mark mode, performing screenshot processing on the map to obtain pixel point positions of all the downloading marks on the first picture, obtaining a pixel point position group A of the downloading mark A and a pixel point position group B of the downloading mark B, if the pixel point position group A and the pixel point position group B have at least n identical pixel point positions, determining that the downloading mark A and the downloading mark B are overlapped, connecting the downloading coordinates A of the downloading mark A and the downloading mark B into a line segment, if the length of the line segment is lower than a length threshold value, determining that the center point of the line segment is a circle center, and obtaining a range of the line segment is a diameter basic range, if the pixel point position group A and the pixel point position group B of the downloading mark B have at least n identical pixel point positions, determining that the total area of the line segment is a basic range, and merging the total abnormal area is large, if the total abnormal area is a basic range.
Optionally, in the searching resource recommendation device, the processing unit is specifically configured to extract a first resource in the resources, determine whether the first resource has a malicious brushing amount within a set time, if so, determine that the first resource is a brushing amount resource, if not, and determine that the first resource is a non-brushing amount resource.
Optionally, in the searching resource recommendation device, the processing unit is specifically configured to count a first number of multiple download requests of the first resource in the set period, extract download coordinates of the multiple download requests if the first number is greater than a first threshold, mark the multiple download requests at the download coordinate positions of a map in a download marking manner, divide the map into multiple rectangles with equal areas, obtain values of the download coordinates in each rectangle, form a second number value group with the values of the download coordinates in each rectangle, count a number of values greater than a second threshold in the second number group and a maximum value in the second number value group if the number is greater than a third threshold or the maximum value is greater than a fourth threshold, determine that the first resource has malicious brushing amount, and otherwise determine that the first resource does not have malicious brushing amount.
Optionally, in the searching resource recommending device, the processing unit is specifically configured to analyze the brushing resource to determine whether the brushing resource is an accurate search of the keyword, and if the brushing resource is an inaccurate search of the keyword, determine that the recommended policy of the brushing resource is to ignore the brushing resource.
Optionally, in the searching resource recommendation device, the adjustment downloading amount=k (total downloading amount-malicious downloading amount), where k is a set coefficient, and a value of k is greater than zero and less than or equal to 1.
Optionally, in the searching resource recommendation device, the recommendation policy is: one or any combination of a download ordering strategy, a click volume comprehensive ordering strategy or a shielding strategy.
Optionally, in the searching resource recommendation device, the processing unit is specifically configured to count a first number of a plurality of download requests of the first resource in a set period of time, extract terminal identifiers of the plurality of download requests if the first number is greater than a first threshold, count a third number value set of values of a download number of each terminal identifier, obtain a second number of values greater than a fifth threshold from the third number value set, if the second number is greater than a sixth threshold, determine that the first resource is a brush resource, if the second number is less than the sixth threshold, and determine that the first resource is a non-brush resource.
Optionally, in the searching resource recommending device, the processing unit is specifically configured to count a first number of multiple download requests of the first resource in a set period, if the first number is greater than a first threshold, extract download coordinates of the multiple download requests, mark the download coordinates of the download requests on a map in a download mark manner, perform screenshot processing on the map to obtain a first picture, identify the first picture to obtain pixel point positions of each download mark in the first picture, obtain a pixel point position group a of the download mark a and a pixel point position group B of the download mark B, if the pixel point position group a and the pixel point position group B have at least n identical pixel point positions, determine that the download mark a overlaps with the download mark B, link the download coordinates a of the download mark a with the download coordinates B of the download mark B to form a line segment, if the length of the line segment is lower than the threshold, determine that the center point of the line segment is lower than the length, identify that the line segment is the first line segment has a basic area overlapping area, and identify that the line segment has a large total area, and if the line segment is the first line segment has a large area overlapping area.
Referring to fig. 1, fig. 1 is a network architecture diagram, as shown in fig. 1, where the mobile terminal may include a smart Phone (such as an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a mobile internet device (MID, mobile Internet Devices), a wearable device, etc., and the mobile terminal is merely exemplary, but not exhaustive, including but not limited to the mobile terminal, which is referred to as a User Equipment (UE) in the following embodiments for convenience of description. Of course, in practical applications, the user equipment is not limited to the above-mentioned variant, and may further include: intelligent vehicle terminals, computer devices, etc. The terminal and the network side equipment can be connected in a wireless link communication or wired mode, and the network equipment and the server can be connected in a wireless mode or wired mode. The communication connection mode may be a single connection mode, a dual connection mode or a multiple connection mode, when the communication connection mode is a single connection mode, the network side device may be a base station, for example, an LTE base station or an NR base station (also referred to as a gNB), when the communication mode is a dual connection mode (specifically, the communication mode may be implemented by a carrier aggregation CA technology, or multiple network side devices), and when the terminal connects multiple network side devices, the multiple network side devices may be a main base station MCG and an auxiliary base station SCG, and data backhaul is performed between the base stations through a backhaul link, where the main base station may be an NR base station, and the auxiliary base station may also be an NR base station.
Referring to fig. 2, fig. 2 is a diagram illustrating a search resource recommendation method according to an embodiment of the present invention, where the method is executed by a server, and the server may be a physical server, for example, a computer, an intelligent device, a workstation, etc., and of course, the server may also be a cloud device. The method is as shown in fig. 2, and comprises the following steps:
step S201, the server receives a search request sent by the terminal, where the search request includes a search keyword.
The server receives the download request sent by the terminal in a wired manner or a wireless manner, specifically, for example, the terminal sends a search request under HTTP (english: hypertext Transfer Protocol, hypertext transfer protocol) to the server in a wired manner. Of course, in practical application, the search request may also be sent in other manners, for example, the terminal sends a search request to the server in a wireless manner, and the search request may be sent through PUCCH (english: physical Uplink Control Channel, physical uplink control channel) or PUSCH (english: physical Uplink Shared Channel, physical uplink shared channel). The search request may include: and (5) terminal identification.
The terminal identifier may specifically be a number of the terminal, a MAC (english: media Access Control, media access control) address of the terminal, an IMIE (english: international Mobile Equipment Identity number, international mobile equipment identity) of the terminal, an IP address of the terminal, etc., although other terminal identifiers may also be used in practical applications, and the embodiment of the present invention is not limited to the specific expression form of the terminal identifier.
Step S202, the server searches the resources corresponding to the keywords according to the keywords.
In step S202, the resource may be multiple, specifically, the resource may be a URL link, and in practical application, the resource may also be a picture or a shortcut resource entry, etc., which is not a specific expression form of the resource.
The specific embodiment of the invention is not limited, and the searching algorithm can be used for searching the resources corresponding to the keyword according to the keyword, and can also be used for searching the resources by adopting an internal searching algorithm or a network searching algorithm.
Step S203, the server analyzes the resources to confirm the brushing amount resources and the non-brushing amount resources in the resources.
In step S203, the judgment manner of the brushing amount resource and the non-brushing amount resource may specifically be that, if the first resource has a malicious brushing amount within a set time, it is determined that the first resource is a brushing amount resource, otherwise, if the first resource does not have a malicious brushing amount within a set time, it is determined that the first resource is a non-brushing amount resource. The judging manner of whether the first resource has the malicious brushing amount may be referred to the description of the following embodiments, which is not repeated here.
Step S204, the server extracts the total download amount of the non-brush amount resources, extracts the adjustment download amount of the brush amount resources, determines the recommended strategy of the resources according to the total download amount and the adjustment download amount, and sends the resources to the terminal according to the recommended strategy.
The adjustment downloading amount in step S204 may specifically be adjustment downloading amount=k (total downloading amount-malicious downloading amount). Wherein k is a set coefficient, and the value of k is greater than zero and less than or equal to 1.
The recommendation policy in the step S204 may be a recommendation policy set by a manufacturer or an operator, for example, a policy ordered according to the downloading amount, a policy comprehensively ordered according to the downloading amount and the clicking amount, and the like, and the specific embodiment of the present invention is not limited to the specific expression form of the recommendation policy, and only needs to obtain or refer to the parameter of the downloading amount.
After receiving a search request, the technical scheme provided by the invention searches the keyword corresponding to the search request to obtain resources, then distinguishes the resources to obtain the brushed amount resources and the non-brushed amount resources, confirms the strategy of extracting the downloading amount according to whether the brushed amount is or not, and then determines the recommendation strategy according to the downloading amount, so that the recommendation of the non-brushed amount resources is optimized, the public hotspots are reflected to the greatest extent, and the user experience is improved.
Optionally, the specific implementation method of determining the recommended policy of the resource according to the total downloading amount and the adjusted downloading amount may be:
and analyzing the brush amount resource to determine whether the brush amount resource is the accurate search of the keyword, if so, ignoring the brush amount resource.
The principle of the technical scheme is that the brush amount resource can be shielded by directly ignoring the brush amount resource when the brush amount resource is subjected to inaccurate search, namely the fuzzy search, so that the recommendation of the brush amount resource in the fuzzy search can be avoided. The technical scenario of this application is mainly as follows, for the search module, the ideal state is that, for the search module, the user can search the resources thought of himself by fuzzy search, taking keyword "take away" as an example, the first website (take away website) may be required by the user, but in the sorting of the search, the second website promotes its rank by malicious brushing amount or some other way so that the rank is before the first website, this is very unfair to the first website, the search module cannot accurately reflect the current hot spot, if this is not ignored, just reject the brushing amount, the warning purpose cannot be achieved, because for this detection of the brushing amount, the operation is complicated, it must be automatically assessed by the device, any software preventing the brushing amount cannot ensure that all the brushing amount can only detect the typical brushing amount mode, other modes cannot be detected, the brushing amount of the second website is relatively high after long-term accumulation, in this case, the second is not very fair, the brushing amount is just removed, the purpose cannot be achieved, even if the searching is not carried out accurately, the invention is not influenced, because the searching is not carried out by the fuzzy technology, the other resources need to be ignored, this is not really the fuzzy searching is carried out, the invention is very accurate, the invention is not influenced, because the searching is carried out, and the user is required to take the searching for the resources, and the fuzzy searching is not really the method is completely ignored. The purpose of the exact search being unmasked here is that it must appear to the user the corresponding results, otherwise it may not be used by the user, for which purpose the exact search is unmasked here in order to improve the user's experience.
In the following, for a practical example, it is assumed that the brushing resource is XXX, its corresponding category is cell phone, and if the search keyword is "cell phone", since it belongs to fuzzy search for brushing resource XXX, XXX will not be displayed in the search result. If the search key is "XXX," this XXX will be displayed in the search results since it belongs to an exact search for the brush resource XXX.
Optionally, the method for determining whether the first resource is a brush resource may specifically be:
counting a first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold value, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the map with the downloading requests in a downloading marking mode, dividing the map into a plurality of rectangles with equal areas, obtaining a value group (namely the number of the downloading coordinates) of the downloading coordinates in each rectangle to form a second number value group, counting the number of values larger than the second threshold value in the second number group and the maximum value in the second number value group, if the number is larger than a third threshold value or the maximum value is larger than a fourth threshold value, determining that the first resource is a brushing amount resource, and if not, determining that the first resource is a non-brushing amount resource.
Referring to fig. 2a, fig. 2a is a schematic diagram of a map with download marks, as shown in fig. 2a, the map is divided into a plurality of rectangles (which may be square in special cases), the number of download coordinates is counted for the rectangles with the same area, and for malicious brushing amount, we find that it generally has two cases, the first case, the download coordinates are relatively fixed, and in this case, many terminals download massive data in a very limited location (such as an office). The second case, in which the download coordinate position is relatively not fixed, but the range in which the download number exceeds the normal number is relatively large, is generally a case in which a malicious brushing amount device completes a corresponding brushing amount in motion. Therefore, in order to provide the above two cases, if the download amount of the set area is large, the malicious brush amount is determined, and this scheme corresponds to the first case, and if the number of the set areas exceeding the download amount exceeds the set number, the malicious brush amount is determined, and this scheme corresponds to the second case.
Optionally, the above method for determining whether the first resource is a brush resource may specifically be:
Counting the first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the downloading requests on a map in a downloading marking mode, performing screenshot processing on the map to obtain a schematic diagram shown in fig. 2B, identifying a first picture in fig. 2B to obtain pixel point positions of each downloading mark on the first picture, obtaining a pixel point position group A of the downloading mark A and a pixel point position group B of the downloading mark B, if the pixel point position group A and the pixel point position group B have at least n identical pixel point positions, determining that the downloading mark A overlaps with the downloading mark B, connecting the downloading coordinates A of the downloading mark A and the downloading coordinates B into a line segment (such as a line segment Y shown in fig. 2B), if the length of the line segment is lower than a length threshold (such as the length of the line segment is larger than the length threshold, removing the line segment), determining that the center point of the line segment is the circle center, obtaining a basic range of the line segment is the diameter, if the line segment is the basic range, and merging the total area of the line segment is the basic range, and if the basic range of the first line segment is the basic range of the total area of the abnormal area is the basic range.
Optionally, the method for determining whether the first resource is a brush resource may specifically be:
counting the first number of a plurality of downloading requests of the first resource in a set time period, extracting a plurality of terminal identifications of the downloading requests if the first number is larger than a first threshold value, counting the downloading number value of each terminal identification to obtain a third number value group, acquiring the second number of values larger than a fifth threshold value from the third number value group, and determining the first resource as a brushing number resource if the second number is larger than a sixth threshold value.
According to the technical scheme, whether the resources are the brushing amount resources is considered from the aspect of excessive download quantity of the same terminal, because the quantity of the terminals which can be used for brushing the amount is limited, the same plurality of terminals can be repeatedly used for downloading the same resource in a certain time, so that a third quantity value group is obtained by counting the download quantity value of each terminal identifier, and the quantity of the third quantity value group which is larger than a certain threshold value is obtained, if the quantity exceeds the set quantity, the quantity of the resources downloaded in the same terminal in the set time period can be known to be very large, and the resources can be basically determined to be the brushing amount resources.
Referring to fig. 3, fig. 3 provides a method for obtaining search resources, where the method is implemented by a user equipment, and the user equipment may be: a smart Phone (such as an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a mobile internet device or a wearable device, etc., and the method is shown in fig. 3, and comprises the following steps:
step S301, the user equipment sends a search request to the network side, where the search request includes: and searching keywords.
The search request in step S301 may be transmitted in a wireless or wired manner. For example by sending an HTTP based search request, which of course may also be sent in other ways, for example wirelessly, for example by PUCCH or PUSCH. The search request may also carry an identification of the user equipment.
The ue identifier may specifically be one or any combination of a number of the terminal, a MAC address of the terminal, an IMIE of the terminal, an IP address of the terminal, etc., although other identifiers may also be used in practical applications, and the embodiment of the present invention is not limited to the specific form of the identifier.
Step S302, the user equipment receives the resource corresponding to the search request and recommends the strategy.
The resources in step S302 may include a swipe resource and a non-swipe resource, where the recommendation policy may be a recommendation policy for the resource, and of course, the recommendation policy may also be set for the swipe resource and the non-swipe resource respectively.
Step S303, the user equipment displays the resource according to the recommendation strategy.
The user equipment provided by the embodiment of the invention realizes the acquisition of the resource corresponding to the search request, and displays the resource according to the recommendation strategy issued by the network side, and supports the realization of the embodiment shown in fig. 2, so that the user equipment has the advantage of improving the user experience.
Referring to fig. 4, fig. 4 provides a search resource recommending apparatus, and technical terms and refinement of the foregoing apparatus may be referred to the description of the embodiment shown in fig. 2, which is not repeated herein. The apparatus comprises:
a transceiver unit 401, configured to receive a search request sent by a terminal, where the search request includes: searching keywords;
a processing unit 402, configured to search, according to the keyword, for a resource corresponding to the keyword, and analyze the resource to confirm a brush amount resource and a non-brush amount resource in the resource; extracting the total downloading amount of the non-brush-amount resources, extracting the adjustment downloading amount of the non-brush-amount resources, determining a recommendation strategy of the resources according to the total downloading amount and the adjustment downloading amount, and sending the resources to the terminal according to the recommendation strategy.
Optionally, the processing unit 402 is specifically configured to extract a first resource from the resources, determine whether the first resource has a malicious amount of brushing in a set time, if so, determine that the first resource is a brushing amount resource, if not, and determine that the first resource is a non-brushing amount resource.
Optionally, the processing unit 402 is specifically configured to count a first number of multiple download requests of the first resource in the set period, extract download coordinates of the multiple download requests if the first number is greater than a first threshold, mark the multiple download requests at the download coordinate positions of a map in a download marking manner, divide the map into multiple rectangles with equal areas, obtain a value of the download coordinates in each rectangle, group the value of the download coordinates in each rectangle into a second number value group, count a number of values greater than a second threshold in the second number group and a maximum value in the second number value group, and determine that the first resource has a malicious brushing amount if the number is greater than a third threshold or the maximum value is greater than a fourth threshold, otherwise determine that the first resource does not have a malicious brushing amount.
Optionally, the processing unit 402 is specifically configured to analyze the brushing resource to determine whether the brushing resource is an accurate search of the keyword, and if the brushing resource is an inaccurate search of the keyword, determine that the recommended policy of the brushing resource is to ignore the brushing resource.
Optionally, the processing unit 402 is specifically configured to count a first number of a plurality of download requests of the first resource in a set period of time, if the first number is greater than a first threshold, extract download coordinates of the plurality of download requests, mark the download coordinates of the download requests on a map in a download mark manner, perform screenshot processing on the map to obtain a schematic diagram as shown in fig. 2B, identify a first picture in fig. 2B to obtain pixel positions of each download mark on the first picture, obtain a pixel position group a of the download mark a and a pixel position group B of the download mark B, if the pixel position group a and the pixel position group B have at least n same pixel positions, determine that the download mark a overlaps with the download mark B, connect the download coordinates a of the download mark a with the download coordinates B of the download mark B into a line segment (e.g. a line segment Y as shown in fig. 2B), if the length of the line segment is lower than a length threshold (e.g. the length of the line segment is greater than the threshold), remove the center of the line segment, determine that the line segment is a circle-shaped, and determine that the circle-shaped area of the line segment is a large-segment is a total-segment-diameter-merging-of the first resource, and determine that the circle-shaped area of the circle-segment is a large-segment is a circle-shaped, and the circle-shaped area of the line is obtained.
Optionally, the processing unit 402 is specifically configured to count a first number of the plurality of download requests of the first resource in a set period of time, if the first number is greater than a first threshold, extract terminal identifiers of the plurality of download requests, count a value of the download number of each terminal identifier to obtain a third number value set, obtain a second number of values greater than a fifth threshold from the third number value set, if the second number is greater than a sixth threshold, and determine that the first resource is a brush resource.
Referring to fig. 5, fig. 5 provides a smart device comprising one or more processors 501, memory 502, transceiver 503, and one or more programs stored in memory 502 and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps of the method as shown in fig. 2.
The processor 501 may be a processor or a controller, such as a central processing unit (Central Processing Unit, CPU), a general purpose processor, a digital signal processor (Digital Signal Processor, DSP), an Application-specific integrated circuit (ASIC), a field programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor may also be a combination that performs the function of a computation, e.g., a combination comprising one or more microprocessors, a combination of a DSP and a microprocessor, and the like. The transceiver 503 may be a communication interface, a transceiver circuit, etc., where the communication interface is commonly referred to and may include one or more interfaces.
Fig. 6 is a block diagram illustrating a part of a structure of an intelligent device serving as a server according to an embodiment of the present invention. Referring to fig. 6, the server includes: radio Frequency (RF) circuitry 910, memory 920, input unit 930, sensor 950, audio circuitry 960, wireless fidelity (Wireless Fidelity, wiFi) module 970, application processor AP980, power source 990, and the like. Those skilled in the art will appreciate that the smart device architecture shown in fig. 6 is not limiting of the smart device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the respective constituent elements of the smart device in detail with reference to fig. 6:
the input unit 930 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the smart device. In particular, input unit 930 may include a touch display 933, a tablet 931, and other input devices 932. The input unit 930 may also include other input devices 932. In particular, other input devices 932 may include, but are not limited to, one or more of physical keys, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc.
The AP980 is a control center of the smart device, and connects various parts of the entire smart device using various interfaces and lines, and performs various functions and processes data of the smart device by running or executing software programs and/or modules stored in the memory 920 and calling data stored in the memory 920, thereby performing overall monitoring of the smart device. Optionally, the AP980 may include one or more processing elements; alternatively, the AP980 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, etc., and the modem processor primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into the AP 980.
In addition, memory 920 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The RF circuitry 910 may be used for the reception and transmission of information. Typically, the RF circuitry 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, the RF circuitry 910 may also communicate with networks and other devices via wireless communications. The wireless communications may use any communication standard or protocol including, but not limited to, global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), email, short message service (Short Messaging Service, SMS), and the like.
RF circuitry 910 for receiving a search request sent by a terminal, the search request comprising: searching keywords;
the AP980 is used for searching the resources corresponding to the keywords according to the keywords, analyzing the resources and confirming the brushing amount resources and the non-brushing amount resources in the resources; extracting the total downloading amount of the non-brush-amount resources, extracting the adjustment downloading amount of the non-brush-amount resources, determining a recommendation strategy of the resources according to the total downloading amount and the adjustment downloading amount, and sending the resources to the terminal according to the recommendation strategy.
Optionally, the AP980 is further configured to extract a first resource in the resources, determine whether the first resource has a malicious brushing amount within a set time, if so, determine that the first resource is a brushing amount resource, if not, and determine that the first resource is a non-brushing amount resource.
Optionally, the AP980 is specifically configured to count a first number of multiple download requests of the first resource in the set period, extract download coordinates of the multiple download requests if the first number is greater than a first threshold, mark the multiple download requests at the download coordinate positions of a map in a download marking manner, divide the map into multiple rectangles with equal areas, obtain a value of the download coordinates in each rectangle, form a second number value group of the values of the download coordinates in each rectangle, count a number of values greater than a second threshold in the second number group and a maximum value in the second number value group, and determine that the first resource has a malicious brushing amount if the number is greater than a third threshold or the maximum value is greater than a fourth threshold, or determine that the first resource does not have a malicious brushing amount if not.
Optionally, the AP980 is specifically configured to analyze the brushing resource to determine whether the brushing resource is an accurate search of the keyword, and if the brushing resource is an inaccurate search of the keyword, determine that the recommended policy of the brushing resource is to ignore the brushing resource.
Optionally, the AP980 is specifically configured to count a first number of a plurality of download requests of the first resource in a set period, if the first number is greater than a first threshold, extract download coordinates of the plurality of download requests, mark the download coordinates of the map with a download mark manner, perform screenshot processing on the map to obtain a schematic diagram as shown in fig. 2B, identify a first picture in fig. 2B to obtain pixel positions of each download mark in the first picture, obtain a pixel position group a of the download mark a and a pixel position group B of the download mark B, where the pixel position group a and the pixel position group B have at least n same pixel positions, determining that the download mark A overlaps with the download mark B, connecting the download coordinate A of the download mark A and the download coordinate B of the download mark B into a line segment (such as a line segment Y shown in fig. 2B), if the length of the line segment is lower than a length threshold (such as the length of the line segment is greater than the length threshold, removing the line segment), determining that the center point of the line segment is a circle center, determining that the circular range of the length of the line segment is a diameter is a basic abnormal range, traversing each download mark in the first picture to obtain a plurality of basic abnormal ranges, merging the basic abnormal ranges with overlapping areas to obtain a merged abnormal range, identifying the total area of the merged abnormal range, and determining that the first resource is a brush amount resource if the total area is greater than the area threshold.
The smart device may also include at least one sensor 950, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, where the ambient light sensor may adjust the brightness of the touch display screen according to the brightness of ambient light, and the proximity sensor may turn off the touch display screen and/or the backlight when the mobile phone moves to the ear. The accelerometer sensor can be used for detecting the acceleration in all directions (generally three axes), detecting the gravity and the direction when the accelerometer sensor is static, and can be used for identifying the gesture of a mobile phone (such as transverse and vertical screen switching, related games, magnetometer gesture calibration), vibration identification related functions (such as pedometer and knocking), and other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors and the like which are also configured by the intelligent device are not repeated herein.
Audio circuitry 960, speaker 961, microphone 962 may provide an audio interface between a user and the smart device. Audio circuit 960 may transmit the received electrical signal after audio data conversion to speaker 961, where speaker 961 converts the electrical signal into a sound signal for playback; on the other hand, microphone 962 converts the collected sound signals into electrical signals, which are received by audio circuit 960 and converted into audio data, which are processed by audio data playback AP980 for transmission to, for example, another smart device via RF circuit 910 or for playback to memory 920 for further processing.
WiFi belongs to a short-distance wireless transmission technology, and a mobile phone can help a user to send and receive emails, browse webpages, access streaming media and the like through a WiFi module 970, so that wireless broadband Internet access is provided for the user. Although fig. 6 shows a WiFi module 970, it is understood that it does not belong to the essential constitution of the smart device, and can be omitted entirely as required within the scope of not changing the essence of the invention.
The smart device also includes a power supply 990 (e.g., a battery or power module) that powers the various components, optionally logically coupled to the AP980 through a power management system, to enable management of charging, discharging, and power consumption by the power management system.
In the embodiment shown in fig. 2, the flow of the method of each step may be implemented based on the structure of the smart device.
In the foregoing embodiments shown in fig. 4 or fig. 5, the functions of each unit may be implemented based on the structure of the smart device.
It can be seen that, according to the embodiment of the invention, the mobile terminal allocates different priorities by identifying different biological identification sequences, and in a set time, if the type of the started second application program is different from that of the first application program, the multi-biological identification operation needs to be executed again, so that the problem that the security is affected by directly giving the highest priority to the different application programs is avoided.
The embodiment of the present invention also provides a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, where the computer program causes a computer to execute part or all of the steps of any one of the methods for searching resource recommendation described in the above method embodiments.
Embodiments of the present invention also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the methods of searching for resource recommendations as set forth in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or partly in the form of a software product, or all or part of the technical solution, which is stored in a memory, and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The foregoing has outlined rather broadly the more detailed description of embodiments of the invention, wherein the principles and embodiments of the invention are explained in detail using specific examples, the above examples being provided solely to facilitate the understanding of the method and core concepts of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.
Claims (15)
1. A search resource recommendation method, the method comprising the steps of:
receiving a search request sent by a terminal, wherein the search request comprises: searching keywords;
searching resources corresponding to the keywords according to the keywords, extracting first resources in the resources, judging whether the first resources have malicious brushing amount within a set time, if so, determining that the first resources are brushing amount resources, if not, and determining that the first resources are non-brushing amount resources;
Extracting the total downloading amount of the non-brushed resources, extracting the adjusted downloading amount of the brushed resources, determining a recommended strategy of the resources according to the total downloading amount and the adjusted downloading amount, and sending the resources to the terminal according to the recommended strategy, wherein the adjusted downloading amount of the brushed resources is smaller than or equal to the total downloading amount of the non-brushed resources; and adjusting the downloading amount=k (total downloading amount-malicious downloading amount), wherein k is a set coefficient, and the value of k is greater than zero and less than or equal to 1.
2. The method of claim 1, wherein the determining whether the first resource has a malicious amount of brushing within a set time comprises:
counting a first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold value, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the plurality of downloading requests at a map in a downloading marking mode, dividing the map into a plurality of rectangles with equal areas, obtaining values of the downloading coordinates in each rectangle, forming a second number value group by the values of the downloading coordinates in each rectangle, counting the number of values larger than a second threshold value in the second number value group and the maximum value in the second number value group, if the number is larger than a third threshold value or the maximum value is larger than a fourth threshold value, determining that the first resource has malicious brushing amount, and if not, determining that the first resource does not have malicious brushing amount.
3. The method of claim 1, wherein the determining the recommended policy for the resource based on the total download amount and the adjusted download amount comprises:
and analyzing the brushing resources to determine whether the brushing resources are accurate searches of the keywords, and if so, determining that the recommended strategy of the brushing resources is to ignore the brushing resources.
4. The method of claim 3, wherein the determining the recommended policy for the brush resource is to ignore the brush resource, comprising:
and shielding the brushing amount resource.
5. The method of claim 1, wherein the recommended policy is: one or any combination of a download ordering strategy, a click volume comprehensive ordering strategy and a shielding strategy.
6. The method of claim 1, wherein the determining whether the first resource has a malicious amount of brushing within a set time comprises:
counting a first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold, extracting terminal identifications of the plurality of downloading requests, counting a third number value group of the downloading number value of each terminal identification, acquiring a second number of values larger than a fifth threshold from the third number value group, if the second number is larger than a sixth threshold, determining that the first resource is a brushing amount resource, if the second number is smaller than the sixth threshold, and determining that the first resource is a non-brushing amount resource.
7. The method of claim 1, wherein the determining whether the first resource has a malicious amount of brushing within a set time comprises:
counting the first number of a plurality of downloading requests of the first resource in a set time period, if the first number is larger than a first threshold value, extracting downloading coordinates of the plurality of downloading requests, marking the downloading coordinates of the downloading requests on a map in a downloading mark mode, performing screenshot processing on the map to obtain pixel point positions of all the downloading marks on the first picture, obtaining a pixel point position group A of the downloading mark A and a pixel point position group B of the downloading mark B, if the pixel point position group A and the pixel point position group B have at least n identical pixel point positions, determining that the downloading mark A and the downloading mark B are overlapped, connecting the downloading coordinates A of the downloading mark A and the downloading mark B into a line segment, if the length of the line segment is lower than a length threshold value, determining that the center point of the line segment is a circle center, and obtaining a range of the line segment is a diameter basic range, if the pixel point position group A and the pixel point position group B of the downloading mark B have at least n identical pixel point positions, determining that the total area of the line segment is a basic range, and merging the total abnormal area is large, if the total abnormal area is a basic range.
8. A search resource recommendation apparatus, characterized in that the apparatus:
the receiving and transmitting unit is used for receiving a search request sent by the terminal, and the search request comprises: searching keywords;
the processing unit is used for searching resources corresponding to the keywords according to the keywords, extracting first resources in the resources, judging whether the first resources have malicious brushing amount within a set time, if so, determining that the first resources are brushing amount resources, and if not, determining that the first resources are non-brushing amount resources; extracting the total downloading amount of the non-brushed resources, extracting the adjusted downloading amount of the brushed resources, determining a recommended strategy of the resources according to the total downloading amount and the adjusted downloading amount, and sending the resources to the terminal according to the recommended strategy, wherein the adjusted downloading amount of the brushed resources is smaller than or equal to the total downloading amount of the non-brushed resources; and adjusting the downloading amount=k (total downloading amount-malicious downloading amount), wherein k is a set coefficient, and the value of k is greater than zero and less than or equal to 1.
9. The apparatus of claim 8, wherein the device comprises a plurality of sensors,
the processing unit is specifically configured to count a first number of a plurality of download requests of the first resource in a set period, extract download coordinates of the plurality of download requests if the first number is greater than a first threshold, mark the plurality of download requests at the download coordinate position of a map in a download marking manner, divide the map into a plurality of rectangles with equal areas, obtain a value of the download coordinates in each rectangle, form a second number value group with the value of the download coordinates in each rectangle, count a number of values greater than a second threshold in the second number value group and a maximum value in the second number value group if the number is greater than a third threshold or the maximum value is greater than a fourth threshold, determine that the first resource has malicious brushing amount, and otherwise determine that the first resource does not have malicious brushing amount.
10. The apparatus of claim 8, wherein the device comprises a plurality of sensors,
the processing unit is specifically configured to analyze the brushing resource to determine whether the brushing resource is an accurate search of the keyword, and if the brushing resource is an inaccurate search of the keyword, determine that the recommended policy of the brushing resource is to ignore the brushing resource.
11. The apparatus of claim 8, wherein the recommendation policy is: one or any combination of a download ordering strategy, a click volume comprehensive ordering strategy and a shielding strategy.
12. The apparatus of claim 9, wherein the device comprises a plurality of sensors,
the processing unit is specifically configured to count a first number of a plurality of download requests of the first resource in a set period of time, extract terminal identifiers of the plurality of download requests if the first number is greater than a first threshold, count a value of the download number of each terminal identifier to obtain a third number value group, obtain a second number of values greater than a fifth threshold from the third number value group, determine that the first resource is a brush resource if the second number is greater than a sixth threshold, and determine that the first resource is a non-brush resource if the second number is less than the sixth threshold.
13. The apparatus according to claim 9, wherein the processing unit is specifically configured to count a first number of the plurality of download requests of the first resource in a set period of time, if the first number is greater than a first threshold, extract download coordinates of the plurality of download requests, mark the download coordinates of the download requests on the download coordinates of the download marks B in a download mark manner, perform screenshot processing on the map to obtain pixel positions of each download mark in the first picture, identify the first picture to obtain pixel position groups a and B of the download marks a, if the pixel position groups a and B of the download marks have at least n identical pixel positions, determine that the download marks a and B overlap, integrate the download coordinates a of the download marks a with the download coordinates B into a line segment, if the length of the line segment is lower than a length threshold, determine that the center line segment has a circle segment, identify that the line segment has a circle segment with a circle segment diameter, and merge the anomaly area as a basic area, and obtain a full-circle segment with a full-circle segment diameter, and a full-segment area, and a full-segment of the full-circle segment of the anomaly area.
14. A smart device, characterized in that the device comprises one or more processors, a memory, a transceiver, and one or more programs, the one or more programs being stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the steps in the method of any of claims 1-7.
15. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method according to any one of claims 1-7.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/100082 WO2019041279A1 (en) | 2017-08-31 | 2017-08-31 | Search resource recommendation method and related product |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110869910A CN110869910A (en) | 2020-03-06 |
CN110869910B true CN110869910B (en) | 2024-04-05 |
Family
ID=65524755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780092163.9A Active CN110869910B (en) | 2017-08-31 | 2017-08-31 | Search resource recommendation method and related products |
Country Status (4)
Country | Link |
---|---|
US (1) | US11288335B2 (en) |
EP (1) | EP3674893B1 (en) |
CN (1) | CN110869910B (en) |
WO (1) | WO2019041279A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11507608B2 (en) * | 2019-01-24 | 2022-11-22 | Dell Products L.P. | System for improving search engine ranking of a landing page using automated analysis of landing pages of third-party entities |
CN111814041A (en) * | 2020-06-23 | 2020-10-23 | 平安普惠企业管理有限公司 | NPM package recommendation method and device, storage medium and computer equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106528745A (en) * | 2016-10-27 | 2017-03-22 | 北京奇虎科技有限公司 | Method and device for recommending resources on mobile terminal, and mobile terminal |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8271336B2 (en) * | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
US7330846B1 (en) * | 2002-02-08 | 2008-02-12 | Oracle International Corporation | System and method for facilitating a distributed search of local and remote systems |
US8650191B2 (en) * | 2010-08-23 | 2014-02-11 | Vistaprint Schweiz Gmbh | Search engine optimization assistant |
US9170849B2 (en) * | 2012-01-09 | 2015-10-27 | Microsoft Technology Licensing, Llc | Migration of task to different pool of resources based on task retry count during task lease |
US9372735B2 (en) * | 2012-01-09 | 2016-06-21 | Microsoft Technology Licensing, Llc | Auto-scaling of pool of virtual machines based on auto-scaling rules of user associated with the pool |
US9058359B2 (en) * | 2012-11-09 | 2015-06-16 | International Business Machines Corporation | Proactive risk analysis and governance of upgrade process |
WO2014167716A1 (en) * | 2013-04-12 | 2014-10-16 | 株式会社日立製作所 | Computer system management system and management method |
US9792629B2 (en) * | 2013-08-05 | 2017-10-17 | Yahoo Holdings, Inc. | Keyword recommendation |
CN104717185B (en) * | 2013-12-16 | 2019-03-26 | 腾讯科技(北京)有限公司 | Displaying response method, device, server and the system of short uniform resource locator |
WO2015151037A1 (en) * | 2014-04-02 | 2015-10-08 | Fabtale Productions Pty Ltd | Enhanced messaging stickers |
US20160043993A1 (en) * | 2014-08-06 | 2016-02-11 | Go Daddy Operatating Company LLC | Optimized domain names and websites based on incoming traffic |
US10332184B2 (en) * | 2014-12-15 | 2019-06-25 | Samsung Electronics Co., Ltd. | Personalized application recommendations |
US9699209B2 (en) * | 2014-12-29 | 2017-07-04 | Cyence Inc. | Cyber vulnerability scan analyses with actionable feedback |
CN105824834B (en) * | 2015-01-06 | 2020-09-11 | 腾讯科技(深圳)有限公司 | Search traffic cheating behavior identification method and device |
US20160224999A1 (en) * | 2015-01-30 | 2016-08-04 | Go Daddy Operating Company, LLC | Recommending common website features |
US20160300260A1 (en) * | 2015-04-09 | 2016-10-13 | Clickbooth.com, LLC | Methods for optimizing advertising traffic with continuously optimized affiliate links |
CN106161397A (en) * | 2015-04-21 | 2016-11-23 | 富泰华工业(深圳)有限公司 | There is the electronic installation of Anti-addiction function, Anti-addiction management system and method |
CN104932966B (en) * | 2015-06-19 | 2017-09-15 | 广东欧珀移动通信有限公司 | Detect that application software downloads the method and device of brush amount |
US20180130119A1 (en) * | 2016-11-10 | 2018-05-10 | DGA, Inc. | Product tagging and purchasing method and system |
CN106844655A (en) * | 2017-01-23 | 2017-06-13 | 广东欧珀移动通信有限公司 | Information processing method, device and computer equipment |
CN107071802B (en) | 2017-03-16 | 2024-02-27 | 同济大学 | Mobile phone APP positioning abnormal data detection method and device |
MX2019008369A (en) * | 2017-03-23 | 2019-09-06 | Lg Electronics Inc | Method and user equipment for receiving downlink signals. |
US11157497B1 (en) * | 2018-04-30 | 2021-10-26 | Splunk Inc. | Dynamically assigning a search head and search nodes for a query |
US11347752B2 (en) * | 2018-07-23 | 2022-05-31 | Apple Inc. | Personalized user feed based on monitored activities |
US20200104898A1 (en) * | 2018-09-27 | 2020-04-02 | Home Depot Product Authority, Llc | Accessory recommendation |
CN109698858A (en) * | 2018-11-01 | 2019-04-30 | 百度在线网络技术(北京)有限公司 | Resource supplying method, equipment and storage medium for smart machine |
US11113294B1 (en) * | 2019-07-16 | 2021-09-07 | Splunk Inc. | Recommending query templates during query formation |
US11120483B1 (en) * | 2019-10-16 | 2021-09-14 | Perform[cb] | Affiliate-based exchange and resource routing |
US11188397B2 (en) * | 2019-10-18 | 2021-11-30 | Splunk Inc. | Mobile application for an information technology (IT) and security operations application |
US11736505B2 (en) * | 2020-02-07 | 2023-08-22 | Mastercard Technologies Canada ULC | Automated web traffic anomaly detection |
-
2017
- 2017-08-31 EP EP17923944.7A patent/EP3674893B1/en active Active
- 2017-08-31 CN CN201780092163.9A patent/CN110869910B/en active Active
- 2017-08-31 WO PCT/CN2017/100082 patent/WO2019041279A1/en unknown
-
2020
- 2020-02-21 US US16/797,160 patent/US11288335B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106528745A (en) * | 2016-10-27 | 2017-03-22 | 北京奇虎科技有限公司 | Method and device for recommending resources on mobile terminal, and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
EP3674893A4 (en) | 2020-07-01 |
US11288335B2 (en) | 2022-03-29 |
US20200192960A1 (en) | 2020-06-18 |
EP3674893A1 (en) | 2020-07-01 |
EP3674893B1 (en) | 2021-07-07 |
WO2019041279A1 (en) | 2019-03-07 |
CN110869910A (en) | 2020-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104142862B (en) | The overload protection method of server and device | |
CN109905380B (en) | Node control method and related device in distributed system | |
CN112134758B (en) | Method and device for monitoring weak network environment and reconnecting communication session | |
CN107682910B (en) | Traffic resource sharing method and device, mobile terminal and storage medium | |
CN104754533B (en) | The method, apparatus and terminal of a kind of SMS interception | |
CN109217995B (en) | Data processing method, terminal and base station | |
CN107634952B (en) | Method and device for determining brushing amount resource, service equipment, mobile terminal and storage medium | |
US20170171255A1 (en) | Method and device for establishing a data connection and computer-readable medium | |
CN109714483B (en) | Screen locking interface message processing method and device, mobile terminal and storage medium | |
CN104967634A (en) | File upload method and apparatus thereof | |
CN110677842B (en) | Network searching method, device, terminal equipment and storage medium | |
WO2018145477A1 (en) | Network access method and terminal | |
CN110869910B (en) | Search resource recommendation method and related products | |
CN106714277A (en) | Network connection method and terminal | |
CN111177612B (en) | Page login authentication method and related device | |
CN106507447A (en) | A Wi-Fi hotspot connection method and mobile terminal | |
CN111615143A (en) | Information reporting method, information receiving method, terminal and network control entity | |
CN106339402B (en) | Method, device and system for pushing recommended content | |
CN115118636B (en) | Method and device for determining network jitter state, electronic equipment and storage medium | |
CN106535229B (en) | WiFi signal receiving sensitivity testing method and mobile terminal | |
CN105162670A (en) | Routing device connecting method and apparatus | |
CN118427220A (en) | Data processing method and device, electronic equipment and storage medium | |
CN107580358B (en) | Network access method and related product | |
CN114155977A (en) | Data processing method and device for clinical research project | |
CN108566649B (en) | Network segment management method of personal hotspot and related products |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |